ResearchSpace

Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN

Show simple item record

dc.contributor.author Burke, Ivan D
dc.contributor.author Herbert, A
dc.contributor.author Mooi, Roderick D
dc.date.accessioned 2019-02-06T12:52:21Z
dc.date.available 2019-02-06T12:52:21Z
dc.date.issued 2018-09
dc.identifier.citation Burke, I.D., Herbert, A. and Mooi, R.D. 2018. Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN. Annual conference of the South African Institute of Computer Scientists and Information Technologists (SAICSIT 2018), Port Elizabeth, 26-28 September 2018, pp. 164-170 en_US
dc.identifier.isbn 978-1-4503-6647-2/18/09
dc.identifier.uri https://dl.acm.org/citation.cfm?doid=3278681.3278701
dc.identifier.uri http://hdl.handle.net/10204/10682
dc.description Copyright: 2018 ACM. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website: https://dl.acm.org/citation.cfm?doid=3278681.3278701 en_US
dc.description.abstract Distributed Denial of Service (DDoS) attacks cause significant disruption on critical networks within South Africa. Timely detection and mitigation is a key concern for the SANReN Cyber Security Incident Response Team (CSIRT). This paper presents an analysis on the Memcached reflection DDoS attack which occurred in February 2018. The attack was the largest DDoS attack to date. By analysing the attack and the impact it had on the SANReN network, this paper aims to show how network flow data can be used to detect network attacks, and perform post attack analysis to prevent future network attacks. The attack time-line is divided into three main phases: pre-attack, peek attack period and post attack residue. en_US
dc.language.iso en en_US
dc.publisher Association for Computing Machinery en_US
dc.relation.ispartofseries Worklist;21812
dc.subject Network attack analysis en_US
dc.subject Network monitoring en_US
dc.subject National Infrastructure en_US
dc.title Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Burke, I. D., Herbert, A., & Mooi, R. D. (2018). Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN. Association for Computing Machinery. http://hdl.handle.net/10204/10682 en_ZA
dc.identifier.chicagocitation Burke, Ivan D, A Herbert, and Roderick D Mooi. "Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN." (2018): http://hdl.handle.net/10204/10682 en_ZA
dc.identifier.vancouvercitation Burke ID, Herbert A, Mooi RD, Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN; Association for Computing Machinery; 2018. http://hdl.handle.net/10204/10682 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Burke, Ivan D AU - Herbert, A AU - Mooi, Roderick D AB - Distributed Denial of Service (DDoS) attacks cause significant disruption on critical networks within South Africa. Timely detection and mitigation is a key concern for the SANReN Cyber Security Incident Response Team (CSIRT). This paper presents an analysis on the Memcached reflection DDoS attack which occurred in February 2018. The attack was the largest DDoS attack to date. By analysing the attack and the impact it had on the SANReN network, this paper aims to show how network flow data can be used to detect network attacks, and perform post attack analysis to prevent future network attacks. The attack time-line is divided into three main phases: pre-attack, peek attack period and post attack residue. DA - 2018-09 DB - ResearchSpace DP - CSIR KW - Network attack analysis KW - Network monitoring KW - National Infrastructure LK - https://researchspace.csir.co.za PY - 2018 SM - 978-1-4503-6647-2/18/09 T1 - Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN TI - Using network flow data to analyse distributed reflection denial of service (DRDoS) attacks, as observed on the South African national research and education network (SANReN): A postmortem analysis of the memcached attack on the SANReN UR - http://hdl.handle.net/10204/10682 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record